Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Presentations
Filter by Library Taxonomy
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is a compendium of information providing guidance on effective approaches to the application of information security at institutions of higher education. It is a key publication of the Higher Education Information Security Council. The guide's content is actively maintained by a large group of volunteers who are information security practitioners at a variety of colleges and universities. The content itself is a rich combination of materials written for the guide, articles written for other publications, presentations from information security conferences, case studies, examples of processes, procedures, and forms used by various institutions, toolkits, hot topics, and references to a wide variety of other materials from EDUCAUSE and other sources. This infographic provides a quick overview of the guide.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- Better Policy Control Through Privilege Management
November 8, 2006
A session at the 2006 CAMP Building Distributed Access Management Infra
Centrally defined privilege management requires a solid integration strategy to assure that privileges expressed by policies and assigned by users are appropriately applied in a timely manner. Ther…
- Welcome and Opening Remarks
June 29, 2006
A session at the 2006 Advanced CAMP: Workflow Models and Technologies
June 29, 2006 CAMP063_154991 …
- The Future of Interboundary Collaboration
February 10, 2006
A session at the 2006 CAMP: Leveraging Campus Auth Across Boundaries
It all fits together: the campus authentication (and identity management) infrastructure is leveraged to share resources without divulging identity (if required) in a way that scales. So what'…
- Web Sign-on Solutions with Pubcookie & Shibboleth
January 1, 2003
Authenticate locally, act globally: that's the Shibboleth way. But where does local Web sign-on begin and end? And how do institutions safeguard end-user privacy while encouraging more user gl…